User guide: How to maintain security and anonymity
Created on: 11/05/04 by jijinmachina[at]yahoo[period]com
Last modified: 1/25/05 by jijnmachina[at]yahoo[period]com
This Work may be freely reproduced, distributed, transmitted, used, modified, built upon, or otherwise exploited by anyone for any purpose, commercial or non-commercial, and in any way, including by methods that have not yet been invented or conceived. However, this disclaimer, the creators name, any modifying parties names, and any contact information must be displayed physically, audibly, and/or visually in any reproduction.
The further you go down this article the more secure/anon you get
Note: Any download of software on this email _is_ compatible with windows, some are only compatible in Windows environs.
\/\/\/\/\/\/Encrypt your email\/\/\/\/\/\/
First, go here:
Download and install
Then, go here:
Download and install
you now have a full set of GnuPG tools available under the menu item "Tools"
Note: Windows only
\/\/\/\/\/\/Hard Drive/File encryption\/\/\/\/\/\/
Much more info on site.
_REALLY_REALLY_IMPORTANT_NOTE_: DO NOT USE ANY KIND OF STANDBY/SLEEP MODE AS THE PROCESS FOR DOING THIS IN WINDOWS WILL DUMP YOUR PASS-PHRASE INTO RAM AS ___CLEAR___TEXT___ (meaning not encrypted...you are warned)
Note: Currently, Windows only.
A nice list of non-anon/anon proxies:
Samair Proxy List
A nice little how to for most people:
Rice.edu how to
\/\/\/\/\/\/Mixmaster Anon Remailers\/\/\/\/\/\/
Mixmasters are a great tool, especially the ones that use SSL:
Autistici.org's anon remailer
A anon protocol for alot of thing on the I-net:
More info on site.
\/\/\/\/\/\/Hard Drive data destruction\/\/\/\/\/\/
US DoD standard for destroying data on hard drives:
\/\/\/\/\/\/Hard drive physical destruction\/\/\/\/\/\/
A halfway decent article:
If you are running a raid 1 array, use a 5.25" hot swappable drive bay. Somebody breaks in wanting data, pull that hard drive out and smash it really hard against something solid. If you are using on-the-fly encryption then not only are you making data recovery difficult by physically harming a portion of the data, when they do go and try to decrypt it, it will be missing data, which will make it 99% unrecoverable.
If you are going to be uber-secure then I recommend a one sentence security philosophy....
-Maintain your diligence, use uber-strong password/phrases, and only keep them in your head.-